1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
77julia77 [94]
3 years ago
6

Dash transfers several bits of data together at one time​

Computers and Technology
1 answer:
Andreas93 [3]3 years ago
6 0

Answer:

Synchronous data transmission is a data transfer method in which a continuous stream of data signals is accompanied by timing signals (generated by an electronic clock) to ensure that the transmitter and the receiver are in step (synchronized) with one another. The data is sent in blocks (called frames or packets) spaced by fixed time intervals.

You might be interested in
Which of the following statements is true of algorithms?
Agata [3.3K]

Answer:

Algorithms allow automation of complex task

Explanation:

I just did it

3 0
3 years ago
Please submit the following assignment prior to Sunday at 11:59 pm. Eastern time: 1. Using a Microsoft Word document, please dis
GenaCL600 [577]

Answer:

Answer explained

Explanation:

United States of America versus Ross Ulbrecht :-

The Fourth Amendment guards against unreasonable searches and seizures by requiring (with limited exceptions) that government agents first obtain a warrant before they go snooping around or confiscating someone’s property. But what exactly does this mean in the modern world of smart phones, wi-fi, and extended Socratic dialogues with Siri? If the New York-based U.S. Court of Appeals for the Second Circuit is to be believed, it means that the government can monitor and collect your internet traffic if this information is merely “likely” to be “relevant” to an ongoing criminal investigation.

That is exactly what happened to Ross Ulbricht, the creator of a website known as “Silk Road,” which enabled users to anonymously buy and sell goods and services. In the course of an investigation into illegal activities associated with the website, the government obtained five “pen/trap” orders authorizing law enforcement to collect IP (internet protocol) addresses for any internet traffic going to or from Ulbricht’s wireless router and other electronic devices. These orders were obtained in lieu of a warrant under a statutory “relevance” standard that falls well short of the Fourth Amendment’s requirement for probable cause.

How could this standard possibly not be constitutionally insufficient? The Second Circuit relied on the “third party doctrine,” ruling that there was no Fourth Amendment issue because users voluntarily conveyed their information to ISPs (internet service providers) and third-party servers, and thus assumed the risk that it would later be turned over without their permission or knowledge. This doctrine, which was developed in the days of pay phones and file cabinets, cannot be fairly extended to online activity given that internet access is—for all intents and purposes—a necessity of modern life for any functioning member of society. Recognizing this simple fact undermines any claim that users have somehow assumed the risk of disclosure to the government, which would have assumed that these users had any real choice in the matter to begin with.

The court also reasoned that because pen/trap devices only reveal IP addresses associated with the user’s online browsing, the collected information doesn’t count as “content” worthy of protection—despite the direct correlation between individual IP addresses and websites, along with the ample information that can be gleaned from knowledge of an individual’s browsing history. The court seemed to conclude that there was no content revealed because an IP address only uncovers the website visited rather than any individual webpage within that site. This superficial approach utterly ignores digital reality.

Finally, the court failed to recognize that the statute authorizing pen/trap data seizure imposes virtually no limits on government attorneys’ discretion. These orders are exceedingly broad in scope and available to nearly any government agency conducting a criminal investigation. Worse still, the court’s role in approving the orders is merely ministerial, with the statute mandating that “the court shall enter an ex parte order authorizing the installation” of these devices.

Because the Second Circuit has stretched both the third-party doctrine and the content/non-content distinction far beyond their logical limitations, Cato—along with the Reason Foundation, Competitive Enterprise Institute, and R Street Institute—has filed an amicus brief asking the Supreme Court to take this case and firmly establish that the internet doesn’t constitute some sort of Constitution-free zone.

5 0
3 years ago
Look at the slide.
svetlana [45]

Answer:

c

Explanation:

5 0
3 years ago
Read 2 more answers
What is the opportunity cost of computers when moving from point A to point B? -15 DVDs b. What is the opportunity cost of compu
oee [108]

Answer:

Increasing

Explanation:

Generally in economics, opportunity cost is the benefit that a person, a business, or an investor forgo or missed when he chooses one alternative instead of the other.

Under production, opportunity cost occurs when a producer sacrifice the production of one for the production of another good. Using good X and Y as examples, opportunity cost is measured by the number of units of good Y that the producer gives up in order to produce one or more units of good X.

In the question, the two products used are computers and DVD. The -15, -18 and -20 implies that producing an extra unit of computer by moving from point A to point B, point B to C, and point C to D, 15, 18 and 20 units of DVD respectively have to be given up.

Since 20 is greater than 18 and 18 is also greater than 15, it therefore implies as we produce more computers, the opportunity cost, which are the number of DVDs given up at each point, are increasing.

I wish you the best.

5 0
3 years ago
​___________, such as smart phones and social​ media, fundamentally change the nature of an industry and can be influential enou
svlad2 [7]

Answer:

Disruptive Technologies.

Explanation:

Smart Phones and the social media are very power tools they can be used to spread a news like a fire very rapidly.

People mostly believe the new that come on their smartphones and the social media.

So the employees of the company can also be influenced by these technologies hence they can disrupt the work of the company and can make or break the company.

6 0
4 years ago
Other questions:
  • What type of device is the printer?
    13·2 answers
  • A search engine company needs to do a significant amount of computation every time it recompiles its index. For this task, the c
    5·1 answer
  • If you select three separate parcels from a parcel feature class, how many rows would be selected in the associated attribute ta
    13·1 answer
  • During which part of geologic time were dinosaurs most common?
    11·2 answers
  • Which function returns a valid value without any arguments?
    13·2 answers
  • What are the pros and cons of using the internet in a medical office setting?
    7·1 answer
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    6·1 answer
  • What are the two extra registers that the fetch decode execute cycle uses to communicate with memory outside of the chip?
    9·1 answer
  • To print photographs in color.​
    7·1 answer
  • Ok it is important aspects which is perfect
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!